<--- Back to Details
First PageDocument Content
Governance / Political science / Social philosophy / Abstraction / Computer network security / National Strategy for Trusted Identities in Cyberspace / Identity management
Date: 2011-06-08 09:47:37
Governance
Political science
Social philosophy
Abstraction
Computer network security
National Strategy for Trusted Identities in Cyberspace
Identity management

Microsoft Word - NSTIC Governance NOI.doc

Add to Reading List

Source URL: www.nist.gov

Download Document from Source Website

File Size: 116,92 KB

Share Document on Facebook

Similar Documents

Overview  Abstraction The Rest

Overview Abstraction The Rest

DocID: 1xW1V - View Document

LMS-Verify Abstraction Without Regret for Verified Systems Programming Nada Amin & Tiark Rompf EPFL & Purdue University

LMS-Verify Abstraction Without Regret for Verified Systems Programming Nada Amin & Tiark Rompf EPFL & Purdue University

DocID: 1xVQq - View Document

SMT Techniques for Fast Predicate Abstraction Shuvendu K. Lahiri1 , Robert Nieuwenhuis2 , and Albert Oliveras2 1

SMT Techniques for Fast Predicate Abstraction Shuvendu K. Lahiri1 , Robert Nieuwenhuis2 , and Albert Oliveras2 1

DocID: 1xVJt - View Document

Predicate Abstraction for Relaxed Memory Models Andrei Dan1 , Yuri Meshman2 , Martin Vechev1 , and Eran Yahav2 1 ETH Zurich {andrei.dan, martin.vechev}@inf.ethz.ch

Predicate Abstraction for Relaxed Memory Models Andrei Dan1 , Yuri Meshman2 , Martin Vechev1 , and Eran Yahav2 1 ETH Zurich {andrei.dan, martin.vechev}@inf.ethz.ch

DocID: 1xVFk - View Document